Search

Your search keyword '"Xiong, Kaiqi"' showing total 240 results

Search Constraints

Start Over You searched for: Author "Xiong, Kaiqi" Remove constraint Author: "Xiong, Kaiqi"
240 results on '"Xiong, Kaiqi"'

Search Results

1. Exploring Feature Importance and Explainability Towards Enhanced ML-Based DoS Detection in AI Systems

2. Nonlinear Transformations Against Unlearnable Datasets

3. Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach

4. Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling

5. Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach

6. A Decentralized Cooperative Navigation Approach for Visual Homing Networks

7. Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis

8. Improving Machine Learning Robustness via Adversarial Training

9. ML Attack Models: Adversarial Attacks and Data Poisoning Attacks

10. Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation

12. Active Learning Under Malicious Mislabeling and Poisoning Attacks

13. An Adversarial Attack Defending System for Securing In-Vehicle Networks

14. A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles

17. SecureCare: A blockchain‐assisted wearable body area network for secure and scalable IoT healthcare services.

18. Prototyping an SDN Control Framework for QoS Guarantees

23. A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware

24. SDN-Based Kernel Modular Countermeasure for Intrusion Detection

25. KrackCover: A Wireless Security Framework for Covering KRACK Attacks

29. A Forensic Methodology for Software-Defined Network Switches

32. MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks

35. The Performance of Public Key-Based Authentication Protocols

37. Resource Provisioning in SLA-Based Cluster Computing

45. Active Learning Under Malicious Mislabeling and Poisoning Attacks

Catalog

Books, media, physical & digital resources